Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-06 13:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) |
(To be available after the conference date) [more] |
|
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Replay Data Selection in Continual Federated Learning Model Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 |
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] |
IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 pp.135-141 |
CNR, BioX |
2024-02-29 15:00 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40 |
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] |
BioX2023-73 CNR2023-40 pp.18-23 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 17:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Enhanced Privacy-Preserving Scheme for Federated Learning of Vision Transformer without Model Performance Degradation Rei Aso, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2023-80 SIP2023-127 SP2023-62 |
Federated learning is a learning method for training models over multiple participants without directly sharing their ra... [more] |
EA2023-80 SIP2023-127 SP2023-62 pp.115-120 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Byzantine attack detection via similarity of local updates in federated learning Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68 |
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] |
EA2023-86 SIP2023-133 SP2023-68 pp.150-155 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193 |
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] |
NS2023-193 pp.125-130 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-16 13:20 |
Okinawa |
|
On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32 |
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] |
CAS2023-62 MSS2023-32 pp.13-18 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Improvement of human flow measurement using flor estimation on depth images Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74 |
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] |
EMM2022-74 pp.38-43 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 13:00 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Continual Learning for Privacy Protection and Data Leakage Prevention Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26 |
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] |
NS2022-123 CQ2022-56 ICM2022-26 pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM) |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |
ISEC, SITE, LOIS |
2022-11-18 16:20 |
Online |
Online |
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25 |
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] |
ISEC2022-41 SITE2022-45 LOIS2022-25 pp.66-72 |
IA, CQ, MIKA (Joint) |
2022-09-15 13:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30 |
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] |
CQ2022-30 pp.42-47 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
MSS, NLP |
2022-03-29 15:45 |
Online |
Online |
Proposal of work end time estimation technology using PC operation logs Rina Yamamoto, Yoshiyuki Sakamaki, Tadanobu Tsunoda, Junpei Yamaguchi, Hisashi Kojima (Fujitsu Ltd.) MSS2021-80 NLP2021-151 |
In conventional working style in offices, employees communicated each other in break time of work. However, it’s difficu... [more] |
MSS2021-80 NLP2021-151 pp.133-138 |